splice and splice-net

Cybersecurity for Operational Technology and Sensor Networks

What is Splice?

SPLICE combines a number of advanced machine learning, security and networking concepts to secure legacy OT/ICS/SCADA and modern I-IoT sensor environments. SPLICE has been specifically designed to require no or minimal reconfiguration and interruption to existing production processes. An encrypted overlay network is established to abstract the OT network in converged OT/IT environments. This is done without requiring any addressing changes on field equipment, HMI's or controllers, and allows for logical isolation and control enhancements (such as micro-segmentation, authentication offloading, microservice injection and vulnerability shielding) to be built into the network core.

SPLICE provides access control, behavioral profiling, Intrusion Detection, and forensic audit trail of all OT control network traffic. SPLICE allows you to take back control over insecure API's. Vulnerability Shielding techniques are used to encapsulate and strengthen insecure API's. Powerful machine learning algorithms and deep packet tag analysis are used to detect anomalous communication between OT devices.

Cybersplice for OT security and IoT security: the logical alternative to air-gaps

What is Splice-net?

SPLICE-NET builds a dedicated encrypted overlay network on top of existing carrier infrastructure, providing our customers with a secure private IoT network. SPLICE-NET is enabled by SPLICE.

SPLICE-NET is carrier independant, allowing sensor networks to expand across carrier footprints, and allowing for high availability by rerouting overlay traffic through alternate carriers.

Customers remain in full control of encryption keys and therefore fully in charge of their sensor networks, even where traffic traverse hostile or untrustworthy networks.

Quick intro

Applications

SCADA

SPLICE enables sensitive real world interfacing devices to co-exist securely inside existing IT networks.

ICS

SPLICE overcomes device and controller vulnerabilities by building vulnerability shielding, authentication, authorisation and access controls into the network layer.

Embedded

SPLICE logically isolates targets in an encrypted overlay network for centralised profiling, segregation and Intrusion Detection.

I-IoT

With SPLICE there is no need to touch the actual equipment or code.

 

Vulnerability Shielding

IT security practices do not always translate well for OT security or IoT security purposes. For various reasons, it may not be viable to patch vulnerabilities in HMI's and PLC's.

SPLICE provides a way to mitigate these vulnerabilities through Vulnerability Shielding by injecting authentication code into the existing communication flow. When a sensitive function is accessed, SPLICE takes over from the normal application flow and requests OTP or password verification before forwarding the request through to the HMI. Using Vulnerability Shielding, Role Based Access Control (with or without two factor authentication) can be built into legacy applications without touching the application code. Vulnerability Shielding works with both legacy and AJAX/websockets based applications.

Latest news

15 February, 2019

Critical Infrastructure exposed through Siemens SICAM remote execution flaw

The latest Siemens advisory includes a critical flaw (CVSS 10) in the DRM systems attached to SICAM 230 process control systems used in Critical Infrastructure 
Editor
16 January, 2019

Building Access Management system plagued by classic OT vulnerabilities

Hardcoded passwords and unpatched vulnerabilities allows takeover of Building Access Control System 
Editor
16 January, 2019

Critical Infrastructure compromised through contractors

Critical Infrastructure is being targeted through luring unsuspecting contractors to waterholes and phishing sites  
Editor
19 December, 2018

US Ballistic Missile Defense System fails with classic OT vulnerabilities

Lack of multi-factor authentication, inconsistent protocol encryption, unpatched vulnerabilities and no intrusion detection capabilities. OT security is evasive  
Editor
15 December, 2018

Sharpshooter targeting Critical Infrastructure

New campaigh targeting nuclear and critical infrastructure.   Attribution   is difficult.
Editor
16 November, 2018

Siemens Industrial Firewall vulnerabilities

False sense of security?   Good to see a patch available  
Editor
16 November, 2018

Hacking construction cranes

How much of a consideration was security during the software design process?   Opportunity for some serious damage here  
Editor
21 August, 2018

IT malware shuts down Taiwan Semiconductor Manufacturing Plants

Collateral damage or targeted OT attack?   TSMC says variant of WannaCry virus brought down its plants | ZDNet  
Editor

View all blog entries